Patents by Inventor Daniel Richard L. Brown

Daniel Richard L. Brown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9864851
    Abstract: A system, device and method for authenticating a user. The system, device and method may employ a computing device for providing credentials required for access to an on-line resource available over a network. The computing device may connect to the on-line resource to register a user. The computing device may receive from the on-line resource at least one request for a credential to identify the user. In response to the request, the computing device may generate a random credential, store the random credential in association with an on-line resource identifier and the request in a data store accessible to the computing device and, submit the random credential to the on-line resource to register the user.
    Type: Grant
    Filed: July 28, 2011
    Date of Patent: January 9, 2018
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Neil Patrick Adams, Scott Alexander Vanstone, Daniel Richard L. Brown, Dinah Lea Marie Davis, Christopher Labrador, Alfred John Menezes
  • Patent number: 9825919
    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: November 21, 2017
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Robert John Lambert, Daniel Richard L. Brown, Atsushi Yamada
  • Publication number: 20170324556
    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Inventor: Daniel Richard L. BROWN
  • Patent number: 9734322
    Abstract: A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital signature is generated using an index value unique to that digital signature and using information associated with the RFID tag; and storing the plurality of digital signatures on the RFID tag in association with respective index values to enable a desired digital signature to be selected according to a provided index value. Also provided are a system and method of enabling an RFID reader to authenticate an RFID tag, which utilize a challenge comprising an index value to request one of the stored signature and authenticating same. Also provided is an RFID tag that is configured to participate in the challenge-response protocol.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: August 15, 2017
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20170118014
    Abstract: Systems, methods, and software can be used to provide security assurance information. In some aspects, a certificate request for a client process on a mobile device is received. A security assurance character for the client process is determined. Whether to grant the certificate request is determined based on the determined security assurance character. In response to determining to grant the certificate request, a certificate is generated.
    Type: Application
    Filed: November 6, 2015
    Publication date: April 27, 2017
    Applicants: Certicom Corp., BlackBerry Limited
    Inventors: Roger Paul Bowman, Catalin Visinescu, Ming Chee Tsang, Daniel Richard L. Brown, Ravi Singh, Thomas Stiemerling
  • Patent number: 9621545
    Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.
    Type: Grant
    Filed: July 14, 2015
    Date of Patent: April 11, 2017
    Assignee: Certicom Corp.
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Gregory Marc Zaverucha
  • Publication number: 20170063534
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, source code that defines seed information and a pseudorandom function is accessed. A parameter for a cryptographic function by operation of one or more data processors is generated. The parameter is generated from the seed information and the pseudorandom function. The parameter has a larger size in memory than the source code that defines the seed information and the pseudorandom function.
    Type: Application
    Filed: April 20, 2015
    Publication date: March 2, 2017
    Applicant: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20170063536
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.
    Type: Application
    Filed: April 20, 2015
    Publication date: March 2, 2017
    Applicant: CERTICOM CORP.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20170063535
    Abstract: Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.
    Type: Application
    Filed: April 20, 2015
    Publication date: March 2, 2017
    Applicant: CERTICOM CORP.
    Inventor: Daniel Richard L. Brown
  • Publication number: 20170012946
    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
    Type: Application
    Filed: November 2, 2015
    Publication date: January 12, 2017
    Applicants: CERTICOM CORP., BLACKBERRY LIMITED
    Inventors: Robert John Lambert, Daniel Richard L. Brown, Atsushi Yamada
  • Patent number: 9503267
    Abstract: Methods, systems, and computer programs for generating a digital signature are disclosed. In some aspects, a symmetric key is accessed. The symmetric key is based on an ephemeral public key. The ephemeral public key is associated with an ephemeral private key. A ciphertext is generated based on the symmetric key and a message. An input value is obtained based on the ciphertext independent of a hash function. A digital signature is generated from the ephemeral private key, the input value, and a long term private key.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: November 22, 2016
    Assignee: Certicom Corp.
    Inventors: Daniel Richard L. Brown, Adrian Antipa
  • Publication number: 20160323844
    Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.
    Type: Application
    Filed: July 14, 2016
    Publication date: November 3, 2016
    Inventor: Daniel Richard L. Brown
  • Publication number: 20160248735
    Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.
    Type: Application
    Filed: January 11, 2016
    Publication date: August 25, 2016
    Applicant: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 9396644
    Abstract: A method for a device to determine that it has been lost is provided. The method comprises the device determining its current location, the device comparing its current location to a plurality of stored locations, and the device determining that it has been lost when its current location is a stored location that has been designated as a location where the device is unlikely to be located or is not a stored location that has been designated as a location where the device is likely to be located.
    Type: Grant
    Filed: August 13, 2014
    Date of Patent: July 19, 2016
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 9325642
    Abstract: Methods, systems, and computer programs for generating random values for encryption operations are described. In some examples, information from a message to be encrypted can be used to refresh the state of a pseudorandom generator. In some aspects, a state parameter of the pseudorandom generator is modified based on information in the message. Modifying the state parameter changes the state parameter from a prior state to a refreshed state based on the information in the message. A random output value is obtained by the pseudorandom generator in the refreshed state. The message is encrypted based on the random output value.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: April 26, 2016
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, Daniel Richard L. Brown
  • Publication number: 20150319164
    Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.
    Type: Application
    Filed: July 14, 2015
    Publication date: November 5, 2015
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Gregory Marc Zaverucha
  • Patent number: 9178699
    Abstract: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and the first secret key is subsequently discarded. A second portion of the message is encrypted using the second secret key. The encrypted first portion of the message and the encrypted second portion of the message are provided to the entity.
    Type: Grant
    Filed: November 6, 2013
    Date of Patent: November 3, 2015
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Robert John Lambert, Daniel Richard L. Brown, Atsushi Yamada
  • Patent number: 9160530
    Abstract: The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.
    Type: Grant
    Filed: March 10, 2014
    Date of Patent: October 13, 2015
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 9106635
    Abstract: A system and method are provided for enabling a client device to connect to a network. The method comprises: obtaining an authorization code via a communication channel different from the network, the authorization code corresponding to the client device; and after detecting initiation of a security negotiation protocol by the client device, using the authorization code in at least one security negotiation operation.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: August 11, 2015
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Gregory Marc Zaverucha
  • Patent number: 9088408
    Abstract: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator accesses a secret key associated with a mobile device. A key derivation function (KDF) is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A session key and a challenge value are obtained based on the output value. In some aspects, the mobile device receives the challenge value and accesses a secret key. A KDF is evaluated based on the secret key to produce a key derivation key, and the KDF is evaluated based on the key derivation key to produce an output value. A response value and a session key are obtained based on the output value. The response value is transmitted to the wireless network operator.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: July 21, 2015
    Assignee: Certicom Corp.
    Inventors: Matthew John Campagna, Daniel Richard L. Brown, Nevine Maurice Nassif Ebeid